Another encryption challenge in cloud-based cyber operations is the secure and efficient management of encryption keys - the secret codes that enable encryption and decryption of data. Keys are the weakest link in the encryption process, as they can be lost, stolen, or compromised. To ensure their safety, there are a few possible solutions. A cloud-based key management service (KMS) can generate, store, and manage encryption keys for cloud data, offering scalability, availability, and integration with other cloud services. However, this implies trusting the cloud provider with the keys which may raise security and compliance concerns. An alternative is a hardware security module (HSM), which is a physical device that generates, stores, and manages the encryption keys. This offers higher security and control over the keys as it is tamper-resistant and isolated from the network. However, this also implies higher cost and complexity as it requires installation, maintenance, and synchronization with cloud services. A hybrid key management approach combines a cloud-based KMS and an HSM - for example, a cloud service can use an HSM to generate and store master keys while a cloud-based KMS can generate and store derived keys. This way master keys are protected by the HSM but derived keys remain accessible and scalable by the cloud-based KMS.